Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios
- 1 September 2021
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Wireless Communications Letters
- Vol. 10 (9), 1989-1993
- https://doi.org/10.1109/LWC.2021.3089636
Abstract
In this letter, we propose three schemes designed to detect attacks over the air interface in cellular networks. These decision rules rely on the generalized likelihood ratio test, and are fed by data that can be acquired using common off-the-shelf receivers. In addition to more classical (barrage/smart) noise jamming attacks, we further assess the capability of the proposed schemes to detect the stealthy activation of a rogue base station. The evaluation is carried out through an experimentation of a LTE system concretely reproduced using Software-Defined Radios. Illustrative examples confirm that the proposed schemes can effectively detect air interface threats with high probability.Keywords
Funding Information
- European Union’s Horizon 2020 Research and Innovation Programme (871249)
This publication has 8 references indexed in Scilit:
- IMSI Catchers in the wild: A real world 4G/5G assessmentComputer Networks, 2021
- Smart Jamming Attacks in 5G New Radio: A ReviewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2020
- New vulnerabilities in 4G and 5G cellular access network protocolsPublished by Association for Computing Machinery (ACM) ,2019
- Identity Confidentiality in 5G Mobile Telephony SystemsPublished by Springer Nature ,2018
- On the Impact of Rogue Base Stations in 4G/LTE Self Organizing NetworksPublished by Association for Computing Machinery (ACM) ,2018
- Attacker-Centric View of a Detection Game against Advanced Persistent ThreatsIEEE Transactions on Mobile Computing, 2018
- IMSI catchers: hacking mobile communicationsNetwork Security, 2017
- Demo: OpenAirInterfacePublished by Association for Computing Machinery (ACM) ,2014